Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

250-587 Exam Dumps - Symantec Data Loss Prevention 16.x Administration Technical Specialist

Searching for workable clues to ace the Symantec 250-587 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s 250-587 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 4

Which option is an accurate use case for Information Centric Encryption (ICE)?

A.

The ICE utility encrypts files matching DLP policy being copied from network share through use of encryption keys.

B.

The ICE utility encrypts files matching DLP policy being copied to removable storage through use of encryption keys.

C.

The ICE utility encrypts files matching DLP policy being copied to removable storage on an endpoint use of certificates.

D.

The ICE utility encrypts files matching DLP policy being copied from network share through use of certificates

Full Access
Question # 5

Refer to the exhibit.

What activity should occur during the baseline phase, according to the risk reduction model?

A.

Define and build the incident response team

B.

Monitor incidents and tune the policy to reduce false positives

C.

Establish business metrics and begin sending reports to business unit stakeholders

D.

Test policies to ensure that blocking actions minimize business process disruptions

Full Access
Question # 6

Which option correctly describes the two-tier installation type for Symantec DLP?

A.

Install the Oracle database on the host, and install the Enforce server and a detection server on a second host.

B.

Install the Oracle database on a local physical host, and install the Enforce server and detection servers on virtual hosts in the Cloud.

C.

Install the Oracle database and a detection server in the same host, and install the Enforce server on a second host.

D.

Install the Oracle database and Enforce server on the same host, and install detection servers on separate hosts.

Full Access
Question # 7

What are three features that are available for Network Discover File System High-Speed Discover (FS-HSD) scans but are NOT available for Network Discover (regular or legacy) File System scans?

A.

Support for SMB v3, Symantec DLP REST APIs, and Internal Pause-Resume

B.

Support for SMB v3, Symantec DLP REST APIs, and incremental scans

C.

Symantec DLP REST APIs, incremental scans, and scan scheduling

D.

Incremental scans, scan scheduling, and incident replication scan status

Full Access
Question # 8

Which of the following actions can you implement ONLY as a Smart Response rule (and not as an automates response rule)?

A.

All: Limit Incident Data Retention

B.

Network Protect: SharePoint Release From Quarantine

C.

All: Set Attribute

D.

All: Add Note

Full Access
Go to page: